5 min read
    0

    Emerging Challenges: The Rising Risk of API-Based Cyberattac…

    The widespread adoption of APIs has been accelerated by the growth of cloud computing, mobile applications, and the Internet of Things (IoT). APIs are fundamental components of modern applications, empowering developers to swiftly integrate third-par...
    by   in Cybersecurity
    5 min read
    0

    Pioneering Secure Horizons: A Human-Centric Exploration of Continuous…

    In today's rapidly changing digital landscape, trust can no longer be a static concept. As cyber threats continue to evolve, we must adapt our cybersecurity strategies to a world where trust is no longer assumed but continually verified. Enter th...
    by in Cybersecurity
    2 min read
    0

    A Guide to Smarter Data Security: Lessons from the Ants and …

    “Data is king!” and “Data is everything” are expressions that have been used time and time again to describe the importance of data as we have become a data-centric world. According to the latest estimates, 328.77 million tera...
    by   in Cybersecurity
    5 min read
    0

    The Crucial Role of Least Privilege and the Synergy of People…

    In the ever-evolving landscape of cybersecurity, it's crucial to stay ahead of the curve and be vigilant as threat actors evolve their attacks to exploit weaknesses in us as humans, our procedures and technology. Both MGM Resorts and Caesars Ente...
    by   in Cybersecurity
    5 min read
    0

    API Security: The Unbreakable Shield for Resilient Software

    Co-authored by Raul Salagean As more enterprises rely on the disparate data connections and scale of web applications and connected apps, application programming interface (API) security has become essential. Last year, adversaries started focusing m...
    by   in Cybersecurity
    1 min read
    0

    Identity in October: NetIQ’s Three Can’t Miss Events

    It’s almost October! While October makes most people excited for fall foliage, pumpkin spice lattes, and of course, Halloween, October makes NetIQ identity professionals excited for our participation in three prestigious events: Identity Week A...
    by   in Cybersecurity
    3 min read
    0

    4 Must Do Activities at Global AppSec – Washington DC

    We’re only a couple weeks away from one of the best Application Security conferences of the year, Global AppSec by the OWASP Foundation, which will take place at the Marriott Marquis Washington DC on Oct 30- Nov 3. With five days of ...
    by   in Cybersecurity
    1 min read
    0

    Did You Miss It? Data Privacy Compliance: A Look at Current Progress…

    Did you know employee threats to data privacy may be growing faster than external threats? This is just one of the many insights discovered by attendees of our recent webinar. Over the past two years, we have worked with Osterman Research to learn mo...
    by   in Cybersecurity
    9 min read
    0

    The ABCs of NIS2 Compliance and Its Global Implications

    The European Union's NIS2 Directive (Network and Information Security) where “the deadline for Member States to transpose the NIS2 Directive into applicable, national law is 17 October 2024” has the potential to have an impact on organiz...
    by in Cybersecurity
    4 min read
    0

    Fortify Hosted: Elevating Application Security Testing with Cloud…

    In today's rapidly evolving digital landscape, the demand for robust application security testing is greater than ever before. Developers are harnessing the power of cloud infrastructure to create applications and APIs that are agile, scalable, a...
    by   in Cybersecurity